1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Advocard [28]
2 years ago
13

How many shared keys are required for a company of 70 employees who all need to communicate securely with each other?

Computers and Technology
1 answer:
kiruha [24]2 years ago
7 0
I Think The Answer Would Be B Or D

You might be interested in
I want to take several courses of MIT OCW, and I'm searching for study groups. Is this website the place to find them?
Ymorist [56]
No, this website is not for study groups. It's more of a 'question and answer' website. There is no actual communication on one certain subject. Although I do know a few websites that have worked really well for me,where you can create and participate in study groups;
-studyblue
- studyhall
- getstudyroom
all of these are safe websites that are used by wide variety of students, therefore i'm sure you can find plenty of people interested in learning the same things as you!
3 0
2 years ago
What are procedures that help keep a data base current
Veseljchak [2.6K]

File maintenance supports adding, modifying, or deleting records, as well as creating backup copies of the database

5 0
3 years ago
Read 2 more answers
Point out the wrong statement :
hoa [83]

Answer:

d. None of the mentioned

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

All of the following statements are true and correct because they are standard internet protocols;

I. Virtual appliances are becoming a very important standard cloud computing deployment object. This depicts the Platform as a Service (PaaS).

II. Cloud computing requires some standard protocols.

III. Cloud computing relies on a set of protocols needed to manage interprocess communications.

8 0
3 years ago
A troubleshooting strategy that removes components from a system in order to get back to a basic configuration is called module
Semmy [17]

Answer:

B. False.

Explanation:

Troubleshooting strategy is a technique used to discover the cause of defeat in a system. The technician must learn to improvise with these strategies to solve a system problems.

Module replacement is a type of troubleshooting strategy that replaces a component with unknown status with another component with good status to determine the cause of the problem.

Removing a component from a system to get back to its basic configuration helps to eliminate factors that may make a computer problem difficult to solve.

3 0
3 years ago
A circumstance in which a manager is using company funds for his or her own personal consumption is called _____. a. information
I am Lyosha [343]

Answer: (C)Self-dealing

Explanation: Self -dealing is the illegal act in the corporate sector in which the manager takes the advantage of the position and try to own the funds and money as his own possession rather than giving it to the shareholders and clients. This act causes severe circumstances for the manager such as penalties,termination etc.

Thus, the correct option is option(c).

6 0
3 years ago
Other questions:
  • Assume that getPlayer2Move works as specified, regardless of what you wrote in part (a) . You must use getPlayer1Move and getPla
    14·1 answer
  • B) If you send me an email, then I will finish my program. If you do not send me an email, then I will go to sleep early. Theref
    10·1 answer
  • Which role is delegated to personnel of the IT department and is responsible for maintaining the integrity and security of the d
    10·1 answer
  • Write a machine-language program to add the three numbers 2, –3, and 6 and output the sum on the output device. Write it in a fo
    11·1 answer
  • To make something ready for some activity is to ________it.
    15·1 answer
  • Choose all of the items that accurately describe an operating system.
    7·1 answer
  • Please choose the correct answer please tell fast​
    15·1 answer
  • What are work incidents/situations or ethical problem?<br>​
    11·2 answers
  • How to transfer polygon from eth to polygon in ledger live
    6·1 answer
  • Different the policies and protocols in the industry
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!